mgt 240 lecture l.
Skip this Video
Loading SlideShow in 5 Seconds..
Mgt 240 Lecture PowerPoint Presentation
Download Presentation
Mgt 240 Lecture

Loading in 2 Seconds...

play fullscreen
1 / 24

Mgt 240 Lecture - PowerPoint PPT Presentation

  • Uploaded on

Mgt 240 Lecture Computing at ND: Security and Network September 9, 2004 Homeworks Homework One Grades posted on course web site Why I asked you to do this Differences between RAM and hard drive Why processor speed matters OIT recommendations Identical homeworks Homework Two

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Mgt 240 Lecture' - ryanadan

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
mgt 240 lecture

Mgt 240 Lecture

Computing at ND:

Security and Network

September 9, 2004

  • Homework One
    • Grades posted on course web site
    • Why I asked you to do this
    • Differences between RAM and hard drive
    • Why processor speed matters
    • OIT recommendations
    • Identical homeworks
  • Homework Two
    • Due tomorrow at 5pm
    • Dropbox problems
    • Help session tonight 7-9pm in L050 – Andy Grau
  • Homework Three
    • Posted on course web site and other usual places
    • Involves using Excel security features
    • More complicated than first two
    • Don’t start on it too late!
today s lecture
Today’s Lecture
  • Excel Security
  • ND Computing: Security
  • ND Computing: Network
    • Guest Speaker: Dewitt Latimer, Deputy CIO, CTO, Assistant VP and Assistant Provost
security threats to excel
Security Threats to Excel
  • Unauthorized person/s are able to
    • See content of workbook
    • Change content of workbook
  • Excel macros can contain viruses
security best practices for excel
Security Best Practices for Excel
  • Protect workbook contents
    • Lock cells, ranges
    • Password protect workbook
    • Set workbook as read only
  • Privacy
    • Encrypt workbook
  • Authenticate workbook
    • Digitally sign workbook
security options in excel
Security Options in Excel
  • HWSales2.xls
  • Protection – Under Tools menu
    • All cells are locked by default but often worksheets aren’t protected
    • Protecting your workbook activates cell locking
    • Prevents modifications to locked cells
    • If you want some cells to be unlocked, you need to specify that before you protect the worksheet
security options in excel8
Security Options in Excel
  • Workbook security settings - Under Options in Tools menu
    • Encrypt entire work book
      • Need to specify
        • Encryption algorithm
        • Password to decrypt and open
    • Password required to modify shared workbook
    • Set shared workbook as read only
    • Digitally sign workbook and/or macros in it to authenticate author
    • Remove personal information from file on save (won’t show up when someone clicks on file properties)
security best practices for excel9
Security Best Practices for Excel
  • Protection against viruses and other malicious access to workbook
    • Download critical updates for Microsoft Office
    • Sign up for email-based security updates from Microsoft
    • Make sure you have anti-virus software and it is up-to-date
    • Set macro security settings to high or medium
    • Clear the Trust all installed add-ins and templates check box
    • Use digital signatures
    • Maintain a list of trusted macro publishers
security options in excel10
Security Options in Excel
  • Security settings for macro execution
    • Very High – only macros installed in trusted locations are allowed to run
    • High – only signed macros from trusted sources allowed to run
    • Medium – You choose whether to run potentially unsafe macros
    • Low – You are not protected from unsafe macros. Use only if you have virus protection software installed or you are sure that the documents you open are safe
nd computing security
ND Computing Security
  • OIT Computing Security web page
    • Who’s in charge of your computer video
12 step guide to safer computing
12-Step Guide to Safer Computing
  • Step 1
    • When not using your computer, disconnect it from the Internet.
      • Connected, your computer is open to intrusions by hackers who can access your files, bank account information and personal details, or may use your machine as a “zombie” to launch Denial of Service (DOS) attacks against Internet Service Providers or Web sites, shutting them down.
12 step guide to safer computing13
12-Step Guide to Safer Computing
  • Step 1 (cont.)
    • Lock out your Windows 2000/XP workstation any time you walk away from your machine.
        • Press CTRL, ALT, DELETE
        • Click Lock Computer
12 step guide to safer computing14
12-Step Guide to Safer Computing
  • Step 2
    • Use updated anti-virus and personal firewall software
      • Firewalls ensure no outside users can access confidential or private data. They also filter inbound and outbound traffic and alert you to attempted intrusions.
      • Activate Windows XP firewall by following the instructions at:
12 step guide to safer computing15
12-Step Guide to Safer Computing
  • Step 2 (cont.)
    • Check for the latest viruses and security information weekly by visiting the OIT web site.
    • Update your anti-virus software daily or set it so it will update automatically.
12 step guide to safer computing16
12-Step Guide to Safer Computing
  • Step 3
    • Make sure your operating system and application software are current.
      • Download software patches for your Windows or Macintosh systems at, respectively.
12 step guide to safer computing17
12-Step Guide to Safer Computing
  • Step 3 (cont.)
    • Install critical MS Office software patches twice a month by visiting:
    • Remove/do not install unnecessary programs and/or services.
12 step guide to safer computing18
12-Step Guide to Safer Computing
  • Step 4
    • Use strong passwords more than eight characters long that include both alpha and numeric elements.
      • Passwords should be completely random.
        • Do not use words from the dictionary or numbers similar to your address, phone number or birth date. If you must use a familiar word or number to remember your password, rearrange it, invert it or combine it with another word or number.
        • If your cat’s name is Fluffy and you live on Pine Street, spell the words backward and combine them: Fluffy becomes “yffulf” and Pine, “enip,” making your new password, “yffulfenip.” For added security, throw your favorite number in: “1yffulfenip3,” “yffulf13enip” or “yffulfenip13.” Use as many characters as the program for which the password is needed permits.
12 step guide to safer computing19
12-Step Guide to Safer Computing
  • Step 5
    • Never write your password down or post it on your monitor – someone may find it! If you must write it down, never leave it unattended.
    • Do not share passwords.
  • Step 6
    • Change your password regularly (monthly).
12 step guide to safer computing20
12-Step Guide to Safer Computing
  • Step 7
    • Files for sharing need password protection.
    • You must always understand what you are downloading
      • Many files found on peer-to-peer sharing programs contain Trojans (malicious programs contained inside seemingly harmless data) or Spyware (a program that can go undetected on your system and gather personal information to transmit over the Internet).
12 step guide to safer computing21
12-Step Guide to Safer Computing
  • Step 8
    • If you discard or trade in your computer, make sure you reformat your hard drive first, ridding it of all sensitive information.
  • Step 9
    • When ordering products online and using your credit card, use only secure Web sites of reputable online merchants. A padlock on your status bar means the site is secure.
12 step guide to safer computing22
12-Step Guide to Safer Computing
  • Step 10
    • Do not e-mail your social security or social insurance number to anybody.
  • Step 11
    • E-mails announcing you have won a prize or credit card e-applications are suspicious. If you are truly intrigued, ask to be mailed a hard copy of the e-mail or form.
    • Be wary of all email attachments, even from those you know.
    • Unless you have had prior notification, do not open email attachments you are not expecting.
  • Step 12
    • Back up critical files and programs. That way, extra copies will be available to you in case of a disaster.
    • Back up your files often.
assigned reading
Assigned Reading
  • Read chapters 4 (pp. 136-147, 167-169) and 9 (346-360) in text
  • Following are questions that you should be sure you can answer based on your understanding of the text
    • Why are telecommunications systems increasingly critical to businesses?
    • What is a telecommunications medium?
    • What is the most widely available wired media type?
    • What is the fastest wired media type?
    • How does a modem work?
    • How much do DSL and cable modems improve upon the speed of modems using standard phone service?
    • What is the difference between decentralized and distributed processing?
    • What is client/server architecture and why is it particularly suitable for businesses today?
    • What is the function of a network operating system?
    • What is the role of a communications protocol?
    • What is the communications protocol used as the foundation of the internet?
    • What is the communications protocol used to support most wireless local area networks?
    • What is a cookie?
    • Why is cryptography critical to the success of e-business?
    • What is the purpose of a digital signature?
    • What can consumers do to protect themselves against identity theft?
    • How can you avoid viruses and worms on your pc?
    • How can biometrics be incorporated into security systems?
    • How does antivirus software work?
    • What is an intrusion detection system?
    • What are the four steps organizations can take to prevent internet-based crime?